Google is facing a class-action lawsuit for tracking people who used the Chrome browser's Incognito mode. Law firm Boies Schiller Flexner filed the complaint on behalf of people who used the privacy mode during the past four years. "Google tracks and collects consumers' history and other Web activity no matter what safeguards consumers undertake to protect their data privacy," it states.

Switzerland has launched a pilot program for SwissCovid, a contact tracing app based on Apple and Google's jointly developed APIs. The APIs will work with iOS 13.5 and devices running Android 6.0 or higher. The pilot involves several thousand workers at Ecole polytechnique fédérale de Lausanne, ETH Zurich, the Swiss Army, and staff at some hospitals and cantonal administrations.

Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversaries have functionally unlimited resources for pursuing top targets.

Like conventional criminals, criminal hackers choose easy, lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after one user at a time when data is collected in one place? Criminal hackers also like to hunt small organizations that have modest capital but weak information security.

The UK's plans to launch a smartphone application to track potential COVID-19 infections won't include Apple and Google. The country's National Health Service has designed its own mobile software to do contact tracing of people exposed to the coronavirus. The NHS reportedly found that its own tech works "sufficiently well." The NHS chose a centralized model for its data collection and storage.

More than any other factor, it is our asset that determines our adversary. For most of us, our asset is the corpus of sensitive personal details used for online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze it. If your data passes through some software or hardware, its developer or maintainer enjoys some measure of control.

At this point, remarking that people now are more concerned about online privacy than ever before is not a novel observation. What's fascinating, though, is that interest in personal digital security has remained high since the issue exploded about seven years ago. In other words, instead of experiencing a short-lived spike, digital privacy awareness has been sustained. This is encouraging.

Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold water on those apps. The apps proposed by Google, Apple and MIT all have voluntary aspects to them.

Life as we knew it before the coronavirus is gone forever, and many changes will manifest in the pandemic's aftermath. How will it impact privacy laws around the globe? No one knows for sure, and we will not know until after the coronavirus is behind us. Cybercriminals long have been taking advantage of the Internet, and now the spread of COVID-19 has sped up their evil work.

As the coronavirus pandemic worsened in the U.S., Zoom Video Communications offered free access to its videoconferencing platform and demand skyrocketed. "Zoom has quickly become the de facto for teleconferencing during the COVID-19 pandemic," said James McQuiggan, security awareness advocate at KnowBe4. "A lot of organizations are using it to keep in contact with their employees."

Apple users wondering if they've caught COVID-19 now can ask digital assistant Siri for advice. The company has rolled out a self-screening feature that allows users to ask, "Hey Siri, do I have the coronavirus?" Siri then takes them through a questionnaire prepared by the U.S. Centers for Disease Control and U.S. Public Health Service to determine if they're exhibiting symptoms of the disease.

A number of VPN and ad-blocking apps owned by Sensor Tower, a popular analytics platform, have been collecting data from millions of people using the programs on their Android and iOS devices, according to a report. The software involved includes Free and Unlimited VPN, Luna VPN, Mobile Data, Adblock Focus for Android devices, and Adblock Focus and Luna VPN for iOS hardware.

Firefox users in the United States are getting an extra measure of privacy protection starting this week, the Mozilla Foundation announced. Firefox Desktop Product Development Vice President Selena Deckelmann heralded the rollout of encrypted DNS over HTTPS, or DoH, by default in Mozilla's browser. The DNS, or Domain Name System, is one of the oldest parts of the Internet.

With the introduction of the CCPA this year and GDPR in 2018, the age of data privacy has begun, bringing the opportunity for businesses to harness it to gain competitive advantage. There are both challenges and opportunities for those that aim to deliver superior CX while adhering to data privacy regulations. Data privacy protection concerns are driving new regulations around the world.

The American Civil Liberties Union has leveled criticisms against facial recognition tool developer Clearview for making misleading claims about the accuracy of its product. Clearview apparently has been telling law enforcement agencies that its technology underwent accuracy testing modeled on the ACLU's 2018 test of Amazon's Rekognition facial recognition tool.

Google misdirected a number of private videos that users of its Google Photos app intended to back up to Google Takeout, sending them instead to strangers' archives. The company emailed affected users to inform them that a technical issue caused the error. Google recommended that affected users back up their content again and delete their previous backup.

We asked ECT News Network's roundtable of industry insiders to reflect on their own personal tech preferences, to speculate on what popular gadgets may vanish from use in the next decade, to consider the role of wearable health tools -- and then to expand the discussion to the health of the planet, tech advances in traveling on it, and the prospect of leaving it altogether.

All eyes are on the West Coast as California reins in the unfettered collection, use and sale of the personal data consumers share as part of the bargain for "free" online services. For years this bargain has been explained in privacy policies that few people read, because there is not a lot of negotiating in the personal data market. The CCPA gives consumers revolutionary rights.

Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost in the gloom are the many ways security professionals have been working to shore up cyberdefenses.

Apple shelved plans to give iPhone users control over encrypted backups stored on the company's iCloud service over concerns raised by the FBI and internal sources, according to a report. The company made the decision to retain control over iCloud encryption around two years ago, but it came to light just recently. The plan would have removed Apple's ability to decrypt users' backups.

The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access, correct and request the deletion of the personal information collected from them.

Sundar Pichai, CEO of Google and parent company Alphabet, called for government regulation of artificial intelligence technology in a speech at Bruegel, a think tank in Brussels, and in an op-ed. There is no question in Pichai's mind that AI should be regulated, he said. The question is what will be the best approach. Sensible regulation should balance potential harm with potential good.

The CCPA -- widely considered to be the toughest law in the U.S. regulating the collection, storage and use of personal information -- went into effect on Jan. 1. Rather than preparing for it, however, many businesses have taken a wait-and-see approach. This could be a serious mistake. The new law is similar in many respects to the EU's GDPR, which went into effect last spring.

Apple and the U.S. Justice Department are at it again. This time it's over cracking a brace of iPhones owned by the Saudi Air Force cadet who killed three sailors in a shooting spree last month at the naval air station in Pensacola, Florida. At a news conference on the findings of an investigation into the incident, U.S. Attorney General William Barr called out Apple for refusing to help the FBI.

The California Consumer Protection Act goes into effect in 2020, and other state and federal laws are on the horizon -- but is it possible that these state laws will really provide us privacy? How many readers take the time to read the privacy policy, or click agreement, when they download a new version of an app on their smartphone or tablet? Probably none. What are the consequences?

We've recently seen much breathless news coverage of the Nightingale Project, Google's half-secret partnership with Ascension, the second-largest healthcare system in the U.S. The details of the project -- which involves sharing the healthcare data of tens of millions of unsuspecting patients -- have raised significant concerns. The concerns have centered around issues that by now are familiar.

Apple's Intelligent Tracking Prevention feature has made it difficult for online advertisers to use cookies to target Safari users. Third-party cookies "serve as the foundation for almost all advertising use cases," noted Jordan Mitchell, head of consumer privacy, identity and data at the IAB Tech Lab. The blocking "negatively affects the ability for brands to target audiences."

Facebook has rejected a request from the U.S., the UK and Australia for a "backdoor" in its encrypted messenger apps to help law enforcement agencies combat crime and terrorism. "Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere," wrote WhatsApp head Will Cathcart and Facebook Messenger head Stan Chudnovsky.

Researchers at a Swedish university have unveiled a method for mixing genetically encoded digital data into common manufacturing materials. The project, carried out in collaboration with an Israeli scientist, involved embedding artificial DNA in a small plastic 3D-printed plastic bunny, which would allow self-replication, according to a report published in Nature Biotechnology.

Cybercriminals have discovered ways to compromise smart TVs, the FBI recently warned. Smart TV owners should do their due diligence to secure the devices, the bureau urged. Smart TVs are just as accessible to unauthorized parties as computers or other Internet-connected devices. Because many TVs now feature microphones and cameras, predators could commit serious privacy intrusions.